Secure wireless communication via adversarial machine learning: A Priori vs. A Posteriori

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 318
  • Download : 0
This paper considers wireless communication system consisted of one transmitter, one legitimate receiver, and one eavesdropper. The transmitter transmits perturbation-added signal (i.e. adversarial example) with a certain modulation type, while the legitimate receiver and the eavesdropper adopt deep neural networks (DNN)-based classifier to recognize the modulation type of the received signal. Compared to the fact that the general goal of adversarial examples being a misclassification of all available classifiers, our objective is to design an adversarial example that lets the legitimate receiver classify accurately while the eavesdropper misclassifies. To this end, we propose two design approaches of the adversarial examples: (i) A priori; (ii) A posteriori, i.e. before and after learning steps of the receiver, respectively. Numerical results show that both approaches are effective for securing the communication link. (C) 2021 The Korean Institute of Communications and Information Sciences (KICS).
Publisher
ELSEVIER
Issue Date
2022-06
Language
English
Article Type
Article
Citation

ICT EXPRESS, v.8, no.2, pp.220 - 224

ISSN
2405-9595
DOI
10.1016/j.icte.2021.06.005
URI
http://hdl.handle.net/10203/297107
Appears in Collection
EE-Journal Papers(저널논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0